Overview
overview
10Static
static
Invoi_PDF#2092.iso
windows10-2004-x64
3Invoi_PDF.lnk
windows10-2004-x64
3cadets/fid...op.cmd
windows10-2004-x64
1cadets/inclines.txt
windows10-2004-x64
1cadets/kid...ily.js
windows10-2004-x64
1cadets/located.png
windows10-2004-x64
3cadets/obtaining.txt
windows10-2004-x64
1cadets/oiliness.txt
windows10-2004-x64
1cadets/per...ly.txt
windows10-2004-x64
1cadets/placeable.png
windows10-2004-x64
3cadets/pos...es.dll
windows10-2004-x64
10cadets/suggested.png
windows10-2004-x64
3cadets/teensy.txt
windows10-2004-x64
1Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 13:52
Static task
static1
Behavioral task
behavioral1
Sample
Invoi_PDF#2092.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
Invoi_PDF.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
cadets/fidgetingPawnshop.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
cadets/inclines.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
cadets/kidskinHandily.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
cadets/located.png
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
cadets/obtaining.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
cadets/oiliness.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
cadets/perpendicularly.txt
Resource
win10v2004-20220901-en
Behavioral task
behavioral10
Sample
cadets/placeable.png
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
cadets/possibilities.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral12
Sample
cadets/suggested.png
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
cadets/teensy.txt
Resource
win10v2004-20220901-en
General
-
Target
cadets/perpendicularly.txt
-
Size
162KB
-
MD5
5951428465e51098f54f40be08c89954
-
SHA1
0619323deb9b9d1792a6b44e39d44ce964a1c384
-
SHA256
d0d2615d7f163f7f48fe5fb6181e78894e92706444c11391be15d46c3799ed62
-
SHA512
7a41f6859175740bbb27553eeb0fe08418929e91dd44f000bbff57acc747fc3ecccf8102619f253b9ef0ae96d1488d674709ddda22ca8e46382d639bf2ef95fa
-
SSDEEP
3072:+buB73uBbAPBT3NlDCNxq8VoWeYFb3NlD99cDlB+lDyQWtRoWszSlmv3NlDMebvU:+buBjuBbcBRlDqiWecplD9uB+lDatyW7
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4700 NOTEPAD.EXE